Serviceteam IT Security News

Ahead of GDPR, Information Governance Comes into Its Own

A full 98 percent of US enterprises have embarked on information governance (IG)...
Serviceteam IT Security News

Researchers Say More Spectre-Related CPU Flaws On Horizon

Yet another speculative execution side channel flaw has been disclosed in processors -...
Serviceteam IT Security News

Six Vulnerabilities Found in Dell EMC’s Disaster Recovery System, One Critical

A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a...
Serviceteam IT Security News

Intel Responds to Spectre-Like Flaw In CPUs

Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative...
Serviceteam IT Security News

Countdown to GDPR

Anybody who is involved in cyber security or data protection will be acutely...
Serviceteam IT Security News

Wicked Botnet Uses Passel of Exploits to Target IoT

The code is integrated with at least three exploits that target unpatched IoT...
Serviceteam IT Security News

EUD Security Guidance: Windows 10 with Mobile Device Management

About this guidance This ALPHA guidance describes how to securely manage Windows 10 Desktop...
Serviceteam IT Security News

GDPR Security Outcomes

This guidance describes a set of technical security outcomes that are considered to...
Serviceteam IT Security News

Cisco Warns of Three Critical Bugs in Digital Network Architecture Platform

The company urges customers to patch three vulnerabilities that received the highest severity...
Serviceteam IT Security News

One Year After WannaCry: A Fundamentally Changed Threat Landscape

Threatpost talked to several security researchers about what's changed in the past year....
Serviceteam IT Security News

Critical Linux Flaw Opens the Door to Full Root Access

The vulnerability allows an attacker to execute a malware or other payloads on...
Serviceteam IT Security News

Phishing, spear phishing and whaling; does it change the price of phish?

The NCSC - in collaboration with CPNI - has recently published guidance on avoiding...
Serviceteam IT Security News

Avoid scoring a cyber security own goal this summer

This blog signposts to existing advice put together to answer any general...
Serviceteam IT Security News

Increased Cyber Threats: Security steps to take

This guidance outlines the security steps that your organisation should take in response...
Serviceteam IT Security News

Attackers Use UPnP to Sidestep DDoS Defenses

Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations....
Serviceteam IT Security News

Spray you, spray me: defending against password spraying attacks

One common way that online accounts are breached is through password spraying, whereby lists...
Serviceteam IT Security News

GDPR Phishing Scam Targets Apple Accounts, Financial Data

A phishing scam fooled victims by claiming to be Apple and scooping up...
Serviceteam IT Security News

Bugs in Logitech Harmony Hub Put Connected IoT Devices at ‘High Risk’

Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light...
Serviceteam IT Security News

Secrets of the Wiper: Inside the World’s Most Destructive Malware

The actors behind this kind of code, whether they’re bent on sending a...
Serviceteam IT Security News

Generic application development guidance

This guidance provides advice on how to minimise the loss of data from...
Serviceteam IT Security News

Apple iOS application development guidance

This guidance contains recommendations for the secure development, procurement and deployment of iOS applications. Please familiarise yourself with the generic application...
Serviceteam IT Security News

Google Project Zero Calls Windows 10 Edge Defense ‘ACG’ Flawed

Researchers maintain Microsoft’s vaunted Arbitrary Code Guard in the Edge browser can’t stop...
Serviceteam IT Security News

Application development collection

This guidance provides advice on how to minimise the loss of data from...
Serviceteam IT Security News

Android application development guidance

This guidance contains recommendations for the  secure development, procurement and deployment of Android applications. Please familiarise yourself with the generic application...
Serviceteam IT Security News

Major OS Players Misinterpret Intel Docs, and Now Kernels Can Be Hijacked

Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation...
Serviceteam IT Security News

Windows application developer guidance

This guidance contains recommendations for the secure development, procurement and deployment of Windows applications. Please familiarise yourself with the generic application...
Serviceteam IT Security News

The NCSC’s guide to developing, procuring and deploying applications

We've just updated our Application development guidance. In addition to the existing Android and...
Serviceteam IT Security News

“Equi-Facts”: Equifax Clarifies the Numbers for Its Massive Breach

As companies continue to install the vulnerable version of Apache Struts behind the...
Serviceteam IT Security News

FBI: Cyber-Fraud Losses Rise to Reach $1.4B

Tech-support scams took off during the year, while whaling/business email compromise was the...
Serviceteam IT Security News

Lenovo Patches Arbitrary Code Execution Flaw

Lenovo warns of a high-severity bug impacting its System x line of servers,...